Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11043: CWE-295 Improper Certificate Validation in B&R Industrial Automation GmbH B&R Automation Studio

0
Critical
VulnerabilityCVE-2025-11043cvecve-2025-11043cwe-295
Published: Mon Jan 19 2026 (01/19/2026, 15:52:14 UTC)
Source: CVE Database V5
Vendor/Project: B&R Industrial Automation GmbH
Product: B&R Automation Studio

Description

An Improper Certificate Validation vulnerability in the OPC-UA client and ANSL over TLS client used in Automation Studio versions before 6.5 could allow an unauthenticated attacker on the network to position themselves to intercept and interfere with data exchanges.

AI-Powered Analysis

AILast updated: 01/19/2026, 16:11:04 UTC

Technical Analysis

CVE-2025-11043 identifies a critical security flaw in B&R Industrial Automation GmbH's Automation Studio software, specifically versions before 6.5. The vulnerability arises from improper certificate validation (CWE-295) within the OPC-UA client and ANSL over TLS client components. OPC-UA (Open Platform Communications Unified Architecture) is a widely used industrial communication protocol designed for secure and reliable data exchange in automation environments. The improper validation means that the software does not correctly verify the authenticity of TLS certificates during secure communications, allowing an attacker positioned on the same network to perform man-in-the-middle (MitM) attacks. Such an attacker can intercept, modify, or inject malicious data into the communication stream without requiring any authentication or user interaction. The CVSS 4.0 vector (AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N) reflects that the attack is network-based, requires low attack complexity, no privileges or user interaction, and results in high confidentiality and integrity impacts. Although no exploits have been reported in the wild yet, the critical nature of this vulnerability and the widespread use of OPC-UA in industrial control systems (ICS) make it a significant threat. The lack of available patches at the time of publication necessitates immediate attention from affected organizations. The vulnerability could enable attackers to disrupt industrial processes, cause data breaches, or manipulate control commands, potentially leading to safety hazards or operational downtime.

Potential Impact

For European organizations, particularly those in manufacturing, energy, and critical infrastructure sectors relying on B&R Automation Studio, this vulnerability poses a severe risk. Exploitation could lead to unauthorized interception and manipulation of sensitive operational data, undermining confidentiality and integrity. This can result in production disruptions, safety incidents, and loss of intellectual property. Given the increasing digitization and interconnectivity of industrial environments in Europe, attackers exploiting this flaw could pivot to other network segments, escalating the impact. The vulnerability's network-based nature means that attackers do not need prior access credentials, increasing the attack surface. The absence of known exploits currently provides a window for proactive mitigation, but the critical CVSS score underscores the urgency. Regulatory compliance frameworks in Europe, such as NIS2 and GDPR, may also be implicated if data confidentiality or operational continuity is compromised.

Mitigation Recommendations

Immediate mitigation involves upgrading B&R Automation Studio to version 6.5 or later, where the certificate validation issue is resolved. Until patching is possible, organizations should enforce strict network segmentation to isolate industrial control systems from general IT networks and untrusted zones. Deploying deep packet inspection and anomaly detection tools focused on OPC-UA traffic can help identify suspicious activities indicative of MitM attacks. Implementing mutual TLS authentication with verified certificates and certificate pinning where feasible can reduce the risk of certificate spoofing. Regularly auditing and updating TLS configurations and cryptographic libraries in use is essential. Additionally, organizations should conduct security awareness training for operational technology (OT) personnel to recognize signs of network tampering. Incident response plans should be updated to include scenarios involving industrial protocol interception. Collaborating with B&R support and monitoring vendor advisories for patches or workarounds is critical.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
ABB
Date Reserved
2025-09-26T09:17:05.598Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696e543dd302b072d9cb38b8

Added to database: 1/19/2026, 3:56:45 PM

Last enriched: 1/19/2026, 4:11:04 PM

Last updated: 1/19/2026, 7:07:24 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats